SYSTEMS AND METHODS FOR COMPLETING A FINANCIAL TRANSACTION
One example embodiment includes a method for increasing payment security during a financial transaction. The method includes identifying the buyer, where identifying the buyer includes confirming the buyer's identity, and issuing a one-time payment code to the buyer. The method also includes receiving the one-time payment code from a seller and authorizing payment to the seller.
Not applicable.
BACKGROUND OF THE INVENTIONConsumers and businesses engage in financial transactions millions of times every day. These transactions include purchases, wages for employment, business payments, loans, and many other types of transactions. These transactions can include many types of financial exchange, including cash, check, debit, credit cards, gift cards and other types of financial exchange. However, each type of financial exchange includes the need for the consumer to carry some form of payment, which leaves the consumer open to loss and fraud.
Consumer credit, in particular, has become a powerful tool in the marketplace. It allows consumers to purchase items that they otherwise would be unable to purchase. For example, the purchase price might be too large or the price might exceed the amount of cash carried by the consumer. It also allows for commerce on the Internet as consumers have a tool that allows them to purchase from a remote location and merchants have a tool to confirm payment before shipping the merchandise.
However, with the increase of credit availability, there has been a corresponding increase in fraud involving consumer credit. In particular, the instance of identity theft has skyrocketed as opportunistic criminals have taken advantage of the greatly increased number and options for credit cards. Identity thieves obtain personal or financial information from a consumer and then use it to steal funds or make purchases at the expense of the consumer. Identity theft is not limited to consumer credit but extends to other payment mechanisms such as check fraud and phishing scams that obtain consumers banking information. Indeed, virtually all existing payment mechanisms include an element of risk.
In particular, each time a transaction involving consumer credit takes place an opportunity exists for identity thieves to obtain the consumer's financial information. The transaction involves the exchange of financial information between the consumer and the merchant. The consumer presents financial information to the merchant who can then use the information to receive the necessary funds and complete the transaction.
The financial information involved can depend on the transaction type. It could include bank account numbers, credit card numbers, debit card numbers or any other type of financial information. All of this financial information includes a common characteristic. The information can be used for multiple transactions. E.g., a credit card number is not changed after it is used for a single transaction. Instead, the same credit card number can be used to complete multiple transactions. That means that during each transaction, there is a chance that the information could be intercepted and subjected to future fraudulent charges.
This presents a dilemma for both consumers and merchants. To reject consumer credit would severely limit opportunities for commerce but to allow consumer credit opens opportunities for identity theft. The consumer is forced to carry multiple types of payment mechanisms, such as credit cards, cash, checks, debit cards and gift cards. In addition to having the keep track of all of the different payment mechanisms, the consumer is subjected to increased fraud and inconvenience.
Accordingly, there is a need in the art for a system that can complete financial transactions without exchanging financial information. Additionally, there is a need in the art for a payment method that is convenient but that can be used only a single time. Further, there is a need in the art for a payment method that allows the user to make purchases without carrying any payment mechanism other that his/her identity. In addition, there is a need in the art for a payment method that is resistant to fraud and identity theft.
BRIEF SUMMARY OF SOME EXAMPLE EMBODIMENTSThis Summary is provided to introduce a selection of concepts in a simplified form that are further described below in the Detailed Description. This Summary is not intended to identify key features or essential characteristics of the claimed subject matter, nor is it intended to be used as an aid in determining the scope of the claimed subject matter.
One example embodiment includes a method for increasing payment security during a financial transaction. The method includes identifying the buyer, where identifying the buyer includes confirming the buyer's identity, and issuing a one-time payment code to the buyer. The method also includes receiving the one-time payment code from a seller and authorizing payment to the seller.
Another example embodiment includes a system for increasing payment security during a financial transaction. The system includes a first hub, where the hub is configured to identify the buyer, and a code generator, where the code generator authorizes the payment and issues a one-time payment code to the first hub. The system also includes a second hub, where the second hub accepts the one-time payment code from the first hub and a payment engine, where the payment engine verifies the one-time payment code and authorizes payment.
Another example embodiment includes a method for increasing payment security during a financial transaction. The method includes confirming the identity of the buyer and determining whether the buyer has sufficient funds in a buyer account to cover the purchase amount. The method also includes issuing a one-time payment code to the buyer if the buyer has sufficient funds and transferring the one-time payment code to the seller. The method further includes confirming the authenticity of the one-time payment code. Confirming the authenticity of the one-time payment code includes determining whether the one-time payment code is a validly issued one-time payment code and determining whether the one-time payment code has expired. The method also includes transferring payment to the seller. Transferring funds to the seller includes crediting the purchase amount to the seller and debiting the purchase amount from the buyer.
These and other objects and features of the present invention will become more fully apparent from the following description and appended claims, or may be learned by the practice of the invention as set forth hereinafter.
To further clarify various aspects of some example embodiments of the present invention, a more particular description of the invention will be rendered by reference to specific embodiments thereof which are illustrated in the appended drawings. It is appreciated that these drawings depict only illustrated embodiments of the invention and are therefore not to be considered limiting of its scope. The invention will be described and explained with additional specificity and detail through the use of the accompanying drawings in which:
Reference will now be made to the figures wherein like structures will be provided with like reference designations. It is understood that the figures are diagrammatic and schematic representations of some embodiments of the invention, and are not limiting of the present invention, nor are they necessarily drawn to scale.
In at least one implementation, the buyer 110 can have different access rights to the buyer account. For example, the buyer 110 can be allowed to spend only a portion of the funds in a buyer account. Additionally or alternatively, the buyer 110 can have restricted access to the balance of spending statements of the buyer account. This can allow for gifts or transfers to the buyer while limiting the purchasing power of the buyers. In particular, allowances, expense accounts, gifts or other portions of a larger buyer account can be provided for spending by the buyer 110.
Additionally or alternatively, the first hub 205 can identify the buyer 110 using one or more implants or other devices placed internally or externally on the body of the buyer 110. For example, the identification can rely on bio-Implants, orthopedic implants, dental implants, brain Implants, extraocular implants or any other implant.
In at least one implementation, the first hub 205 can include a personal buyer hub. A personal buyer hub is one that is linked to an account of a single buyer 110. That is, a personal buyer hub is linked to a specific buyer account or accounts. For example, a personal buyer hub could include a user's cell phone, computer or other device used only by a single buyer 110 or group of buyers. As used in the specification and the claims, the term device shall include any artifact, apparatus, structure or gadget that is capable of performing the desired function, unless otherwise specified.
Additionally or alternatively, a personal buyer hub could include a secure website that the user can log into from any location. The personal buyer hub can also include a hub that can be used by a group of users. For example, a personal buyer hub can include a computer in a secure location that a corporation's employees can access, allowing select employees to make payments in behalf of the corporation.
In contrast, the first hub 205 can include a shared buyer hub. A shared buyer hub is one that can be used by more than one buyer. In at least one implementation, a shared buyer hub can be installed in or near a site maintained by the seller 115 to speed and facilitate transaction processing from multiple buyers. For example, a shared buyer hub can be located at the seller's place of business. The buyer 110 is authenticated on the shared buyer hub prior to a request for the transaction on the buyer's account.
In at least one implementation, the second hub 215 is not able to interact directly with the code generator 210. This can ensure that the second hub 215 is not able to access any of the buyer's 110 financial information. In particular, the buyer's financial information is stored by the code generator 210 and cannot be accessed via the second hub 215 because the second hub 215 is unable to interact directly with the code generator 210.
One of skill in the art will appreciate that the code generator 210 and the payment engine 220 can include separate entities. Additionally or alternatively the code generator 210 can be a sub-element of the payment engine 220 or that the payment engine 220 can be a sub-element of the code generator 210. Additionally or alternatively, the code generator 210 and the payment engine 220 can be separate elements of a larger structure. One of skill in the art will also appreciate that the code generator 210 can perform the functions of the payment engine 220 or vice versa without restriction.
In at least one implementation, once the authenticity of the one-time payment code has be confirmed, the payment engine 220 transfers the funds for any necessary payment from the buyer 110 to the seller 115. In particular, the payment engine 220 transfers funds from an account specified by the buyer 110 to an account specified by the seller 115. The payment occurs without the exchange of financial information between the buyer 110 and the seller 115, as discussed above.
In at least one implementation, the buyer can have different access rights to the buyer account. For example, the buyer can be allowed to spend only a portion of the funds in a buyer account. Additionally or alternatively, the buyer can have restricted access to the balance of spending statements of the buyer account. This can allow for gifts or transfers to the buyer while limiting the purchasing power of the buyers. In particular, allowances, expense accounts, gifts or other portions of a larger buyer account can be provided for spending by the buyer.
In at least one implementation, identifying the buyer 305 can include interacting with the buyer in order to confirm the buyer's identity. For example, identifying the buyer 305 can include confirming the buyer's identity through biometric identification. Biometric identification, or biometrics, comprises methods for uniquely recognizing individuals based upon one or more intrinsic physical or behavioral traits, as discussed above. Additionally or alternatively, identifying the buyer 305 can include confirming the buyer's identity using one or more implants in or on the buyer's body, as discussed above.
In at least one implementation, identifying the buyer 305 can include the use of a personal buyer hub. A personal buyer hub is one that is linked to an account of a single buyer. That is, a personal buyer hub is linked to a specific buyer account or accounts. For example, a personal buyer hub could include a user's cell phone, computer or other device used only by a single buyer or group of buyers. Additionally or alternatively, a personal buyer hub could include a secure website that the user can log into from any location. The personal buyer hub can also include a hub that can be used by a group of users. For example, a personal buyer hub can include a computer in a secure location that a corporation's employees can access, allowing select employees to make payments in behalf of the corporation.
In contrast, identifying the buyer 305 can include the use of a shared buyer hub. A shared buyer hub is one that can be used by more than one buyer. In at least one implementation, a shared buyer hub can be installed in or near a site maintained by the seller to speed and facilitate transaction processing from multiple buyers. The buyer is authenticated on the shared buyer hub prior to a request for the transaction on the buyer's account.
One skilled in the art will appreciate that, for this and other processes and methods disclosed herein, the functions performed in the processes and methods may be implemented in differing order. Furthermore, the outlined steps and operations are only provided as examples, and some of the steps and operations may be optional, combined into fewer steps and operations, or expanded into additional steps and operations without detracting from the essence of the disclosed embodiments.
In at least one implementation, confirming the identity of the buyer 405 can include the use of a personal buyer hub. A personal buyer hub is one that is linked to an account of a single buyer. That is, a personal buyer hub is linked to a specific buyer account or accounts. For example, a personal buyer hub could include a user's cell phone, computer or other device used only by a single buyer or group of buyers. Additionally or alternatively, a personal buyer hub could include a secure website that the user can log into from any location. The personal buyer hub can also include a hub that can be used by a group of users. For example, a personal buyer hub can include a computer in a secure location that a corporation's employees can access, allowing select employees to make payments in behalf of the corporation.
In contrast, confirming the identity of the buyer 405 can include the use of a shared buyer hub. A shared buyer hub is one that can be used by more than one buyer. In at least one implementation, a shared buyer hub can be installed in or near a site maintained by the seller to speed and facilitate transaction processing from multiple buyers. The buyer is authenticated on the shared buyer hub prior to a request for the transaction on the buyer's account.
In at least one implementation, the buyer can have different access rights to the buyer account. For example, the buyer can be allowed to spend only a portion of the funds in a buyer account. Additionally or alternatively, the buyer can have restricted access to the balance of spending statements of the buyer account. This can allow for gifts or transfers to the buyer while limiting the purchasing power of the buyers. In particular, allowances, expense accounts, gifts or other portions of a larger buyer account can be provided for spending by the buyer.
The present invention may be embodied in other specific forms without departing from its spirit or essential characteristics. The described embodiments are to be considered in all respects only as illustrative and not restrictive. The scope of the invention is, therefore, indicated by the appended claims rather than by the foregoing description. All changes which come within the meaning and range of equivalency of the claims are to be embraced within their scope.
Claims
1. A method for facilitating a financial transaction without any exchange of payment information or money tender details between a buyer and a seller, the method comprising:
- identifying the buyer, wherein identifying the buyer includes confirming the buyer's identity;
- issuing a one-time payment code to the buyer;
- receiving the one-time payment code from a seller, wherein the one-time payment code has been transferred from the buyer to the seller; and
- authorizing payment to the seller.
2. The method of claim 1, wherein confirming the buyer's identity includes biometric identification.
3. The method of claim 2, wherein biometric identification includes one of:
- fingerprint confirmation;
- face recognition;
- DNA;
- palm print;
- hand geometry;
- iris recognition;
- odor recognition; or
- retina scan.
4. The method of claim 2, wherein biometric identification includes one of:
- typing rhythm;
- gait; or
- voice recognition.
5. The method of claim 1, wherein confirming the buyer's identity includes logging the user into a secure website.
6. The method of claim 1, further comprising invalidating the one-time payment code when not used within a certain time period.
7. The method of claim 1, further comprising marking the one-time payment code as invalid after it is received from the seller.
8. A system for facilitating a financial transaction without any exchange of payment information or money tender details between a buyer and a seller, the system comprising:
- a first hub, wherein the hub is configured to identify the buyer;
- a code generator, wherein the code generator authorizes the payment and issues a one-time payment code to the first hub;
- a second hub, wherein the second hub accepts the one-time payment code from the first hub; and
- a payment engine, wherein the payment engine verifies the one-time payment code and authorizes payment.
9. The system of claim 8, wherein the first hub transmits the one-time payment code to the second hub wirelessly.
10. The system of claim 8, wherein the first hub is a cell phone.
11. The system of claim 8, wherein the first hub is a computer.
12. The system of claim 8, wherein the first hub is a personal buyer hub, wherein the personal buyer hub is configured to:
- be used by only a single buyer.
13. The system of claim 8, wherein the first hub is a shared buyer hub, wherein the shared buyer hub is configured to:
- be used by multiple buyers.
14. The system of claim 0, wherein the shared buyer hub is located at the seller's place of business.
15. A method for facilitating a financial transaction without any exchange of payment information or money tender details between a buyer and a seller:
- confirming the identity of the buyer;
- determining whether the buyer has sufficient funds in a buyer account to cover the purchase amount;
- issuing a one-time payment code to the buyer if the buyer has sufficient funds;
- transferring the one-time payment code to the seller;
- confirming the authenticity of the one-time payment code, wherein confirming the authenticity of the one-time payment code includes: determining whether the one-time payment code is a validly issued one-time payment code; and determining whether the one-time payment code has expired; and
- transferring payment to the seller, wherein transferring funds to the seller includes: crediting the purchase amount to the seller; and debiting the purchase amount from the buyer.
16. The method of claim 16, wherein the buyer account includes one of:
- a savings account;
- a credit card;
- a debit account;
- a line of credit; or
- a checking account.
17. The method of claim 16, wherein the method further comprises:
- issuing a notice to the buyer that the one-time payment code has been used.
18. The method of claim 15, further comprising:
- invalidating the one-time payment code when not used within a certain time period.
19. The method of claim 16, further comprising:
- invalidating the one-time payment code after it is received from the seller.
20. The method of claim 16, further comprising:
- connecting the buyer to a code generator over a first network; and
- connecting the seller to a payment engine over a second network.
Type: Application
Filed: Oct 1, 2010
Publication Date: Apr 5, 2012
Inventor: Michel Triana (Port Washington, NY)
Application Number: 12/896,257
International Classification: G06Q 40/00 (20060101);